US20210056239A1 - Information processing method, terminal, device and storage medium - Google Patents

Information processing method, terminal, device and storage medium Download PDF

Info

Publication number
US20210056239A1
US20210056239A1 US16/960,076 US201916960076A US2021056239A1 US 20210056239 A1 US20210056239 A1 US 20210056239A1 US 201916960076 A US201916960076 A US 201916960076A US 2021056239 A1 US2021056239 A1 US 2021056239A1
Authority
US
United States
Prior art keywords
terminal
privacy
level switch
screen
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US16/960,076
Other languages
English (en)
Inventor
Zhengbo TANG
Di WAN
Baisheng ZHANG
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Assigned to ZTE CORPORATION reassignment ZTE CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: TANG, Zhengbo, WAN, Di, ZHANG, Baisheng
Publication of US20210056239A1 publication Critical patent/US20210056239A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • G06F1/16Constructional details or arrangements
    • G06F1/1613Constructional details or arrangements for portable computers
    • G06F1/1633Constructional details or arrangements of portable computers not specific to the type of enclosures covered by groups G06F1/1615 - G06F1/1626
    • G06F1/1637Details related to the display arrangement, including those related to the mounting of the display in the housing
    • G06F1/1647Details related to the display arrangement, including those related to the mounting of the display in the housing including at least an additional display
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/14Digital output to display device ; Cooperation and interconnection of the display device with other functional units
    • G06F3/1423Digital output to display device ; Cooperation and interconnection of the display device with other functional units controlling a plurality of local displays, e.g. CRT and flat panel display
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/14Digital output to display device ; Cooperation and interconnection of the display device with other functional units
    • G06F3/1423Digital output to display device ; Cooperation and interconnection of the display device with other functional units controlling a plurality of local displays, e.g. CRT and flat panel display
    • G06F3/1446Digital output to display device ; Cooperation and interconnection of the display device with other functional units controlling a plurality of local displays, e.g. CRT and flat panel display display composed of modules, e.g. video walls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/02Constructional features of telephone sets
    • H04M1/0202Portable telephone sets, e.g. cordless phones, mobile phones or bar type handsets
    • H04M1/0206Portable telephones comprising a plurality of mechanically joined movable body parts, e.g. hinged housings
    • H04M1/0208Portable telephones comprising a plurality of mechanically joined movable body parts, e.g. hinged housings characterized by the relative motions of the body parts
    • H04M1/021Portable telephones comprising a plurality of mechanically joined movable body parts, e.g. hinged housings characterized by the relative motions of the body parts using combined folding and rotation motions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/7243User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/7243User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
    • H04M1/72436User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for text messaging, e.g. SMS or e-mail
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72484User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/032Protect output to user by software means
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09GARRANGEMENTS OR CIRCUITS FOR CONTROL OF INDICATING DEVICES USING STATIC MEANS TO PRESENT VARIABLE INFORMATION
    • G09G2358/00Arrangements for display data security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2250/00Details of telephonic subscriber devices
    • H04M2250/16Details of telephonic subscriber devices including more than one display unit

Definitions

  • the present disclosure relates to the field of communications.
  • FIG. 1 is a schematic diagram of the four display modes.
  • a terminal in the dual-screen mirror mode may have a problem of leaked privacy information.
  • a terminal including: a setting module and a privacy protection module, where the setting module is provided with a first-level switch and a second-level switch, under a condition that the first-level switch is turned on, a display mode of the terminal is set to a dual-screen mirror mode, and the second-level switch is configured to enable or disable a privacy protection function under the condition that the first-level switch is turned on; and the privacy protection module is connected to the second-level switch and configured to protect privacy information in the terminal based on the privacy protection function under a condition that the second-level switch is turned on.
  • an information processing method including: receiving a first signal indicating that a first-level switch of a terminal is turned on, where after the first-level switch is turned on, a display mode of the terminal is set to a dual-screen mirror mode; receiving a second signal indicating that a second-level switch of the terminal is turned on, where after the second-level switch is turned on, a privacy protection function of the terminal is enabled, and the second-level switch is effective under a condition that the first-level switch is turned on; and protecting privacy information in the terminal based on the privacy protection function.
  • an information processing device including: a first receiving module configured to receive a first signal indicating that a first-level switch of a terminal is turned on, where after the first-level switch is turned on, a display mode of the terminal is set to a dual-screen mirror mode; a second receiving module configured to receive a second signal indicating that a second-level switch of the terminal is turned on, where after the second-level switch is turned on, a privacy protection function of the terminal is enabled, and the second-level switch is effective under a condition that the first-level switch is turned on; and a protection module configured to protect privacy information in the terminal based on the privacy protection function.
  • a storage medium including a program stored thereon which, when executed by a processor, causes the processor to implement the method according to an embodiment of the present disclosure.
  • a processor for executing a program, where the program, when executed by the processor, causes the processor to implement the method according to an embodiment of the present disclosure.
  • FIG. 1 is a schematic diagram of four display modes in some cases
  • FIG. 2 is a structural block diagram of a terminal according to an embodiment of the present disclosure
  • FIG. 3 is a structural block diagram of hardware in a mobile terminal implementing an information processing method according to an embodiment of the present disclosure
  • FIG. 4 is a flowchart of an information processing method according to an embodiment of the present disclosure.
  • FIG. 5 is a structural block diagram of an information processing device according to an embodiment of the present disclosure.
  • FIG. 6 is a structural block diagram of a terminal provided according to another embodiment of the present disclosure.
  • FIG. 7 is a schematic flowchart of an information processing method according to another embodiment of the present disclosure.
  • a terminal which may be a dual-screen terminal.
  • the terminal may have four display modes: a single screen mode, a dual-screen mirror mode, a dual-screen split mode and a dual-screen wide screen mode.
  • the embodiments of the present disclosure are applicable to privacy information protection of the dual-screen terminal in the dual-screen mirror mode.
  • FIG. 2 is a structural block diagram of a terminal according to an embodiment of the present disclosure. As shown in FIG. 2 , the terminal includes: a setting module 20 and a privacy protection module 22 .
  • the setting module 20 is provided with a first-level switch 200 and a second-level switch 202 .
  • a display mode of the terminal is set to a dual-screen mirror mode, and the second-level switch 202 is configured to enable or disable a privacy protection function under the condition that the first-level switch 200 is turned on.
  • the privacy protection module 22 is connected to the second-level switch 202 and configured to protect privacy information in the terminal based on the privacy protection function under a condition that the second-level switch 202 is turned on.
  • the first-level switch 200 is configured to turn on/off the dual-screen mirror mode of the terminal, and the second-level switch 202 is effective under the condition that the first-level switch 200 is turned on. Regarding this, it may be considered that the second-level switch 202 is in a subdirectory or menu after the first-level switch 200 is turned on, but is not limited thereto.
  • the second-level switch 202 may be set under the first-level switch 200 so that the terminal enables or disables the privacy protection function through the second-level switch 202 under the condition that that the first-level switch 200 is turned on (i.e., the display mode of the terminal is set to the dual-screen mirror mode), thereby realizing protection to the privacy information, further ensuring information security of the user, and improving user experience. Therefore, the problem of leaked privacy information of a terminal in the dual-screen mirror mode in some cases can be solved.
  • the privacy protection module 22 may include: a privacy detection unit configured to detect whether the privacy information is present in content to be displayed by the terminal; and a privacy processing unit configured to protect the privacy information under a condition that presence of the privacy information is detected.
  • the privacy information may be default privacy information or user-defined privacy information.
  • the default privacy information may be predefined in a system by a manufacturer, such as but not limited to, incoming call display, message display, status bar notifications, and the like.
  • the user-defined privacy information may be keywords such as “money” and “password” defined by the user in a setting module (setting menu), for which the privacy detection module may perform keyword matching.
  • the privacy processing unit may include: a first notification unit configured to notify the setting module 20 to switch the display mode of the terminal from the dual-screen mirror mode to another display mode or to turn off the first-level switch 200 .
  • the privacy processing unit may include: a second notification unit and a first display unit.
  • the second notification unit is configured to notify the first display unit to process a first screen of the terminal.
  • the first screen is a screen on which the privacy information needs to be protected.
  • the first display unit is configured to perform at least one of: powering down the first screen, turning off backlight of the first screen and blurring display content on the first screen.
  • blurring the display content on the first screen may be regarded as blurring the privacy information in the display content on the first screen, such as providing an overlay layer, but is not limited thereto.
  • the first display unit may be further configured to identify a first screen and a second screen of the terminal, and after the first screen and the second screen of the terminal are identified, information on the first screen and the second screen may be uploaded to surfaceflinger of the system for storage.
  • the privacy protection module 22 may include: an acquisition unit and a second display unit.
  • the acquisition unit is configured to acquire a designated signal.
  • the designated signal carries location information of an area containing the privacy information.
  • the second display unit is configured to blur display content in the area according to the location information.
  • the designated signal may be triggered by a touch operation on the area, such as selecting the area by touching the first screen, but is not limited thereto.
  • FIG. 3 is a structural block diagram of hardware in a mobile terminal implementing an information processing method according to an embodiment of the present disclosure.
  • a mobile terminal 30 may include one or more processors 302 (only one is shown) (the processor 302 may include, but is not limited to, a microprocessor (MCU) or a processing device of a programmable logic device such as FPGA), a memory 304 configured to store data, and a transmission means 306 for communication.
  • MCU microprocessor
  • FPGA programmable logic device
  • FIG. 3 is merely illustrative, and does not form any limitation to the structure of the above mobile terminal.
  • the mobile terminal 30 may include more or fewer components than those shown in FIG. 3 , or have a different configuration than that shown in FIG. 3 .
  • the memory 304 is configured to store software programs of application software and modules, such as program instructions/modules corresponding to the information processing method in the embodiments of the present disclosure.
  • the processor 302 executes the software programs and modules stored in the memory 304 to perform various functional applications and data processing, that is, implement the above method.
  • the memory 304 may include a high speed random access memory and may also include a non-volatile memory such as one or more magnetic storage device, flash memory, or other non-volatile solid state memory.
  • the memory 304 may further include a memory remotely located relative to the processor 302 , which memory may be connected to mobile terminal 30 via a network. Examples of such networks include, but are not limited to, the Internet, intranets, local area networks, mobile communication networks, and combinations thereof.
  • the transmission means 306 is configured to receive or transmit data via a network. Specific examples of such networks may include a wireless network provided by a communication provider of the mobile terminal 30 .
  • the transmission means 306 includes a Network Interface Controller (NIC) that may be connected to another network device through a base station to communicate with the Internet.
  • the transmission means 306 may be a Radio Frequency (RF) module configured to communicate with the Internet wirelessly.
  • NIC Network Interface Controller
  • RF Radio Frequency
  • FIG. 4 is a flowchart of an information processing method according to an embodiment of the present disclosure. As shown in FIG. 4 , the flow includes the following steps S 402 to S 406 .
  • a first signal indicating that a first-level switch of a terminal is turned on is received. After the first-level switch is turned on, a display mode of the terminal is set to a dual-screen mirror mode.
  • a second signal indicating that a second-level switch of the terminal is turned on is received. After the second-level switch is turned on, a privacy protection function of the terminal is enabled, and the second-level switch is effective under a condition that the first-level switch is turned on.
  • step S 406 privacy information in the terminal is protected based on the privacy protection function.
  • the second-level switch may be set under the first-level switch so that the terminal enables or disables the privacy protection function through the second-level switch under the condition that that the first-level switch is turned on (i.e., the display mode of the terminal is set to the dual-screen mirror mode), thereby realizing protection to the privacy information, further ensuring information security of the user, and improving user experience. Therefore, the problem of leaked privacy information of a terminal in the dual-screen mirror mode in some cases can be solved.
  • the terminal may be a dual-screen terminal, or may be a terminal provided by the above embodiments, but is not limited thereto.
  • step S 406 may be implemented in many manners. For example, it may be implemented through an automatic mode and a manual mode.
  • the step S 406 may include the following steps: detecting whether the privacy information is present in content to be displayed by the terminal; and protecting the privacy information under a condition that the privacy information is detected.
  • the privacy information may be default privacy information or user-defined privacy information.
  • the default privacy information may be predefined in a system by a manufacturer, such as but not limited to, incoming call display, message display, status bar notifications, and the like.
  • the user-defined privacy information may be keywords such as “money” and “password” defined by the user in a setting module (setting menu), for which the privacy detection module may perform keyword matching.
  • protecting the privacy information may be implemented in many manners.
  • the step of protecting the privacy information may include: switching the display mode of the terminal from the dual-screen mirror mode to another display mode or turning off the first-level switch.
  • protecting the privacy information includes at least one of: powering down a first screen of the terminal; turning off backlight of the first screen of the terminal; and blurring display content on the first screen of the terminal.
  • the first screen is a screen on which the privacy information needs to be protected.
  • the step 5406 may include the following steps: acquiring a third signal which carries location information of an area containing the privacy information; and blurring display content in the area according to the location information.
  • the third signal may be triggered by a touch operation on the area, such as an operation of selecting the area by touching the first screen, but is not limited thereto.
  • the executor of the above steps may be a terminal, such as a dual-screen terminal, but is not limited thereto.
  • the computer software product is stored in a storage medium (such as an ROM/RAM, a disk, or an optical disc) and includes a number of instructions for causing a terminal device (which may be a cell phone, a computer, a server, or a network device, etc.) to perform the methods of various embodiments of the present disclosure.
  • a storage medium such as an ROM/RAM, a disk, or an optical disc
  • an information processing device configured to implement the above embodiments. Details which have been explained will not be repeated here.
  • the term “module” may be a combination of software and/or hardware that can realize a preset function.
  • the devices described in the following embodiments are preferably implemented in software, but hardware, or a combination of software and hardware, is also possible and contemplated.
  • FIG. 5 is a structural block diagram of an information processing device according to an embodiment of the present disclosure. As shown in FIG. 5 , the device includes: a first receiving module 52 , a second receiving module 54 , and a protection module 56 .
  • the first receiving module 52 is configured to receive a first signal indicating that a first-level switch of a terminal is turned on. After the first-level switch is turned on, a display mode of the terminal is set to a dual-screen mirror mode.
  • the second receiving module 54 is connected to the first receiving module 52 , and is configured to receive a second signal indicating that a second-level switch of the terminal is turned on. After the second-level switch is turned on, a privacy protection function of the terminal is enabled, and the second-level switch is effective under the condition that the first-level switch is turned on.
  • the protection module 56 is connected to the second receiving module 54 , and is configured to protect privacy information in the terminal based on the privacy protection function.
  • the second-level switch may be set under the first-level switch so that the terminal enables or disables the privacy protection function through the second-level switch under the condition that that the first-level switch is turned on (i.e., the display mode of the terminal is set to the dual-screen mirror mode), thereby realizing protection to the privacy information, further ensuring information security of the user, and improving user experience. Therefore, the problem of leaked privacy information of a terminal in the dual-screen mirror mode in some cases can be solved.
  • the protection module 56 may include: a detection unit configured to detect whether the privacy information is present in content to be displayed by the terminal; and a first protection unit connected to the detection unit, and configured to protect the privacy information under a condition that the privacy information is detected.
  • the privacy information may be default privacy information or user-defined privacy information.
  • the default privacy information may be predefined in a system by a manufacturer, such as but not limited to, incoming call display, message display, status bar notifications, and the like.
  • the user-defined privacy information may be keywords such as “money” and “password” defined by the user in a setting module (setting menu), for which the privacy detection module may perform keyword matching.
  • the first protection unit is further configured to switch the display mode of the terminal from the dual-screen mirror mode to another display mode or turn off the first-level switch.
  • the first protection unit is further configured to perform at least one of: powering down a first screen of the terminal; turning off backlight of the first screen of the terminal; and blurring display content on the first screen of the terminal.
  • the first screen is a screen on which the privacy information needs to be protected.
  • the protection module 56 may include: an acquisition unit configured to acquire a third signal which carries location information of an area containing the privacy information; and a second protection unit connected to the acquisition unit, and configured to blur display content in the area according to the location information.
  • the third signal may be triggered by a touch operation on the area, such as an operation of selecting the area by touching the first screen, but is not limited thereto.
  • the device may be located in the terminal, such as a dual-screen terminal, but is not limited thereto.
  • each of the above modules may be implemented by software or hardware. For the latter, it may be implemented by, but are not limited to: all of the above modules are located in the same processor; or the above modules are located in different processors in any combination.
  • a storage medium including a program stored thereon.
  • the program when executed by a processor, causes the processor to implement any one of the methods according to the above embodiments.
  • the storage medium may include, but is not limited to: a U disk, a read-only memory (ROM), a random access memory (RAM), a mobile hard disk, a disk or optical disk, and other media that can store a program code.
  • a processor for executing a program.
  • the program when executed by the processor, causes the processor to implement any one of the methods according to the above embodiments.
  • a terminal there is provided a terminal.
  • a switch is added in a setting mode of the terminal (for example, via the setting module 20 of the terminal), and in a case that a user uses a “dual-screen mirror mode”, a “privacy protection” switch (e.g., the second-level switch described above) is turned on.
  • a privacy detection module e.g., the privacy detection unit described above
  • the manual processing mode the user may manually select an area on the display screen, which is then processed by the system to protect privacy within the area.
  • FIG. 6 is a structural block diagram of a terminal provided according to another embodiment of the present disclosure.
  • a “privacy protection” switch (e.g., the second-level switch 202 ) may be added under the “dual-screen mirror mode” switch (e.g., the first-level switch 200 ).
  • the privacy protection switch may be turned on to enable the privacy protection function, and may be turned off to disable the privacy protection function.
  • the user may also customize the privacy content, or the like.
  • a privacy detection module e.g., the privacy detection unit or the detection unit described above
  • a privacy processing module e.g., the privacy processing unit or the first protection unit described above
  • a display module e.g., the first display unit and/or the second display unit described above
  • the privacy detection module may be operated in a default mode or a user-defined mode.
  • the privacy detection module may be a background service developed by a mobile phone manufacturer. If the default mode is adopted, the default privacy content is defined in the system by a mobile phone manufacturer, such as incoming call display, message display, status bar notifications, and the like, and the privacy detection module may register with corresponding modules. When there is a call, a message, a notification, or the like, the privacy detection module will receive a broadcast or other message, and thus knows that some privacy content (e.g., the privacy information described above) is about to be displayed.
  • some privacy content e.g., the privacy information described above
  • the user is required to define the privacy in a setting menu (e.g., the setting module), for example, by setting keywords such as “money” and “password” as privacy.
  • the privacy detection module performs keyword matching, and determines that a privacy content is included if keywords such as “money” and “password” are detected in the display content.
  • the privacy processing module may perform a processing after the privacy detection module detects the privacy information in the display content of the system.
  • the privacy processing module may perform the following two operations: 1) notifying the setting module to switch the display mode, such as switching from the dual-screen mirror mode to a dual-screen wide screen mode; and 2) notifying the display module to process the display content.
  • the display module may identify the first screen and the second screen, and after information of the first screen and the second screen is operated by a linux kernel, the information is uploaded to surfaceflinger of Android system for storage.
  • the system may process the first screen and/or the second screen.
  • the display module may also process the display of the first screen. There may be many manners to do this, such as powering down the first screen, turning off backlight of the first screen, providing an overlay layer for the display content on the first screen in surfaceflinger to perform blurring, and so on.
  • an area containing the privacy information on the touch screen is selected, the touch screen reports coordinates through an android input subsystem, and the display module acquires the coordinate location information. Then, similarly to the method used in the automatic mode, an overlay layer may be provided for the display content on the second screen in surfaceflinger to perform blurring, thereby implementing privacy protection.
  • FIG. 7 is a schematic flowchart of an information processing method according to another embodiment of the present disclosure. As shown in FIG. 7 , the method may include the following steps. For example, it is determined whether the terminal is in a dual-screen mirror mode, and if yes, it is determined whether a privacy protection switch is turned on. Under the condition that that the privacy protection switch is turned on, privacy protection is required and may be implemented by two modes: an automatic mode and a manual mode.
  • privacy detection may be performed to determine whether privacy information is present. If the privacy information is present, the privacy may be processed, for example, by switching the display mode via the setting module, or by powering down, or turning off backlight or an overlay layer for the first screen via the display module, and so on. If the privacy information is not present, normal display may be performed by the display module.
  • the protection area may be manually selected to acquire a location of the selected area, and the overlay layer is arranged on the area via the display module.
  • the respective modules and steps in the present disclosure can be realized by using a general-purpose computing device; they can be integrated in a single computing device, or can be distributed on a network that consists of a plurality of computing devices. They can be realized by using the executable program code of the computing device, that they can be stored in a storage device and executed by the computing device, in some cases, can perform the shown or described steps in a sequence other than herein, or they are made into different integrated circuit modules respectively, or a plurality of modules or steps thereof are made into a single integrated circuit module, thus to be realized. In this way, the present disclosure is not restricted to any particular hardware and software combination.
US16/960,076 2018-01-05 2019-01-02 Information processing method, terminal, device and storage medium Abandoned US20210056239A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN201810012269.XA CN110012147A (zh) 2018-01-05 2018-01-05 终端、信息处理方法及装置、存储介质、处理器
CN201810012269.X 2018-01-05
PCT/CN2019/070053 WO2019134638A1 (zh) 2018-01-05 2019-01-02 信息处理方法、终端、装置及存储介质

Publications (1)

Publication Number Publication Date
US20210056239A1 true US20210056239A1 (en) 2021-02-25

Family

ID=67144363

Family Applications (1)

Application Number Title Priority Date Filing Date
US16/960,076 Abandoned US20210056239A1 (en) 2018-01-05 2019-01-02 Information processing method, terminal, device and storage medium

Country Status (4)

Country Link
US (1) US20210056239A1 (zh)
EP (1) EP3723353A4 (zh)
CN (1) CN110012147A (zh)
WO (1) WO2019134638A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117859130A (zh) * 2022-07-29 2024-04-09 广州视源电子科技股份有限公司 数据传输方法、装置、会议系统、无线传屏器和存储介质

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20110084653A (ko) * 2010-01-18 2011-07-26 삼성전자주식회사 휴대단말에서 프라이버시 보호 방법 및 장치
KR20130079155A (ko) * 2011-12-22 2013-07-10 인제대학교 산학협력단 이동 단말기의 사생활 보호 시스템 및 방법
CN104076872B (zh) * 2013-03-29 2018-07-06 联想(北京)有限公司 一种电子设备
CN104063058B (zh) * 2014-07-10 2017-09-08 努比亚技术有限公司 分屏的应用方法及移动终端
CN104408385A (zh) * 2014-11-10 2015-03-11 广州三星通信技术研究有限公司 在终端中隐藏隐私内容的设备和方法
CN104679387B (zh) * 2015-02-13 2018-05-01 广东欧珀移动通信有限公司 一种隐私信息保护方法及终端
US10431007B2 (en) * 2016-05-31 2019-10-01 Augumenta Ltd. Method and system for user interaction
CN106557711B (zh) * 2016-11-04 2018-07-24 深圳大学 移动终端设备的屏幕隐私保护方法及系统
CN106814988A (zh) * 2016-12-26 2017-06-09 宇龙计算机通信科技(深圳)有限公司 一种屏幕控制方法、装置及终端
CN107454212A (zh) * 2017-06-14 2017-12-08 中兴通讯股份有限公司 一种转轴结构、电子设备及控制方法

Also Published As

Publication number Publication date
WO2019134638A1 (zh) 2019-07-11
EP3723353A4 (en) 2021-09-15
CN110012147A (zh) 2019-07-12
EP3723353A1 (en) 2020-10-14

Similar Documents

Publication Publication Date Title
CN108712561B (zh) 权限管理方法、装置、移动终端以及存储介质
US10420071B2 (en) Methods, apparatus, and systems for displaying notifications
EP3165019B1 (en) Method and apparatus of notifying of smishing
US20130055387A1 (en) Apparatus and method for providing security information on background process
CN105933546B (zh) 一种消息通知方法、装置及终端
US20170168805A1 (en) Method and electronic device for system updating
CN106921799A (zh) 一种移动终端安全防护方法以及移动终端
JP2019512113A (ja) 通知メッセージ処理方法及び装置
CN104978180B (zh) 一种未处理事件的提示方法、装置及移动终端
CN105376719A (zh) 信息推送方法和装置
CN106681813B (zh) 一种系统管理方法及装置
WO2017201965A1 (zh) 通知消息的显示方法及装置、终端
CN108572866B (zh) 一种应用程序管理方法、应用程序管理装置及移动终端
CN112270015A (zh) 数据保护方法、装置、电子设备及可读存储介质
CN106384043B (zh) 一种二维码安全防护方法及相关设备
CN110610090A (zh) 信息处理方法及装置、存储介质
CN105279433B (zh) 一种应用程序的防护方法及装置
US20210056239A1 (en) Information processing method, terminal, device and storage medium
KR101206086B1 (ko) 발신 번호의 인증을 이용한 피싱 방지 시스템 및 그 방법
CN112929254A (zh) 消息处理方法、装置和电子设备
CN112016080A (zh) 应用权限管理方法、装置及电子设备
US10915434B2 (en) Method for controlling a test environment on a mobile device
CN106302935B (zh) 一种通信信息的识别方法及系统
CN113852962A (zh) 网络连接控制方法、设备、存储介质和软件程序产品
KR101946569B1 (ko) 모바일 운영체계 시스템의 발신 호 스푸핑 방지 방법, 이를 위한 장치, 컴퓨터 판독 가능 기록 매체 및 컴퓨터 프로그램

Legal Events

Date Code Title Description
AS Assignment

Owner name: ZTE CORPORATION, CHINA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:TANG, ZHENGBO;WAN, DI;ZHANG, BAISHENG;REEL/FRAME:053118/0221

Effective date: 20200619

STPP Information on status: patent application and granting procedure in general

Free format text: APPLICATION DISPATCHED FROM PREEXAM, NOT YET DOCKETED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION